Novinky Magazín Security
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Daily update on current cyber security threats
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。 企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Solutions Executive Security 森マークがお届けします。 みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message 2024年interfm「The Dave Fromm Show」初出演は2月16日(金)16:30頃~です。 是非お聴きください!
…
continue reading
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
Digital security principles in tiny powerful packages that are easy to understand, no matter your skill level.
…
continue reading
In diesem Podcast sprechen wir über die Grundlagen von IT-Security. Ein praktischer Einstieg für alle, die an Software arbeiten.
…
continue reading
In this episode of The #SecurityANGLE, Shelly Kramer, managing director and principal analyst at #theCUBEResearch, is joined by Jo Peterson, VP of cloud and security services at #Clarify360 and a member of #theCUBECollective community of independent analysts. Check out theCUBE for the latest in enterprise tech https://siliconangle.com/category/cube-event-coverage/
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
The Security Ledger: Cyber Security News & Analysis for The Internet of Things
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
1
Kicking Off With Crypto - PSW #827
3:04:10
3:04:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
3:04:10
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
…
continue reading
1
ChatGPT Writes Exploits - PSW #827
1:59:20
1:59:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:59:20
ChatGPT writes exploits, banning default and weak passwords, forget vulnerabilities just get rid of malware, IR blasting for fun and not profit, creating fake people, shattered dreams and passkey, and removing chips. Show Notes: https://securityweekly.com/psw-827
…
continue reading
1
AI, Okta, Chrome, Quantum, Kaiser Permanente, FTC, FCC, NCSC, Josh Marpet, and more. - SWN #382
37:23
37:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:23
AI, Okta, Chrome, Quantum, Kaiser Permanente, FTC, FCC, NCSC, Josh Marpet, and more, are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-382
…
continue reading
1
Rational Security: The “RatSecapella” Edition
1:15:41
1:15:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:15:41
This week, Alan, Quinta, and Scott were joined by Lawfare Contributing Editor Eric Ciaramella to talk through the week’s big natsec stories, including: “Not Done Nyet.” U.S. foreign assistance is finally on its way to Ukraine, along with additional support from European allies. But will it be enough to solidify or advance the beleaguered Ukrainian …
…
continue reading
1
Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape
37:10
37:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:10
Host Paul Roberts speaks with Jim Broome, the CTO and President of DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSPs). The post Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape... R…
…
continue reading
1
A Vast New Dataset Could Supercharge the AI Hunt for Crypto Money Laundering
9:55
9:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:55
Blockchain analysis firm Elliptic, MIT, and IBM, have released a new AI detection model—and the 200-million-transaction dataset it's trained on—that aims to spot the “shape” of Bitcoin money laundering. Learn more about your ad choices. Visit megaphone.fm/adchoicesעל ידי SpokenLayer
…
continue reading
1
Chinese disinformation, NCSC AMS, new State Secrets law
6:52
6:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:52
Chinese disinformation proving ineffectual NCSC release Advanced Mobile Solutions risk model China implements new State Secrets Law Thanks to our episode sponsor, Dropzone AI Cybersecurity leaders, are you being asked to leverage the power of Gen AI in your SOC? Dropzone.ai's AI Autonomous Analyst empowers your team to thoroughly investigate every …
…
continue reading
1
RSA 2024 Preview: What are These Sessions Even About?
53:55
53:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:55
In this special episode, Dennis Fisher and Lindsey O'Donnell-Welch are joined by Brian Donohue of Red Canary to preview the RSA conference talks they're excited about and to try to make sense of some of the session titles that are maybe a little indecipherable.על ידי Decipher
…
continue reading
1
ISC StormCast for Thursday, May 2nd, 2024
6:51
6:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:51
Linux Trojan - Xorddos with Filename eyshcjdmzg https://isc.sans.edu/diary/Linux%20Trojan%20-%20Xorddos%20with%20Filename%20eyshcjdmzg/30880 AWS S3 Denial of Wallet Amplification Attack https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1 https://blog.limbus-medtec.com/the-aws-s3-denial-of-wallet-am…
…
continue reading
1
The closed loop conundrum, default passwords, and Baby Reindeer
54:03
54:03
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
54:03
The UK Government takes aim at IoT devices shipping with weak or default passwords, an identity thief spends two years in jail after being mistaken for the person who stole his name, and are you au fait with the latest scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graha…
…
continue reading
1
Security Breach: Predictions That Hit
31:07
31:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:07
As we near our 100th episode of Security Beach, I thought it would be a good time to take a look back at some of our guest’s predictions from the previous 12 months. If you want to check out the full episodes from any of these previous guests, you can find them in the show archives, or by clicking through to our website. So, join me as we take a lo…
…
continue reading
1
EP 071 Stefanie Drysdale Senior Vice President of Prescient, 'Do you know enough about Executive Digital Protection?
51:45
51:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
51:45
BIO A frank discussion about Digital Executive Protection. An instrumental part of building Prescient’s Cyber offerings, particularly the firm’s Executive Digital Protection (EDP) program, which is geared toward corporate security professionals and private clients, supporting organizations and high-profile clients while assisting with operational g…
…
continue reading
1
B2B.11 "Vinny Peone - Eastern Security Services"
1:04:29
1:04:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:04:29
Bid2Bank is a Security Today segment that is tackling everything from the bid to the bank. Uncle Baer interviews SMB Owners, Entrepreneurs and lowvoltage technicians who run their own show as the questions range from everything dealing with marketing, project management, customer experience and more! We've made it back with another ripe peach fille…
…
continue reading
1
SN 972: Passkeys: A Shattered Dream? - IoT Default Passwords, Passkeys
2:11:22
2:11:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:11:22
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-…
…
continue reading
1
How is Kubernetes Network Security Evolving?
20:19
20:19
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
20:19
How is eBPF impacting Kubernetes Network Security? In this episode, recorded LIVE at Kubecon EU Paris 2024, Liz Rice, Chief Open Source Officer at Isovalent took us through the technical nuances of eBPF and its role in enabling dynamic, efficient network policies that go beyond traditional security measures. She also discusses Tetragon, the new sub…
…
continue reading
1
STIR/SHAKEN with Paul Grubbs and Josh Brown
1:01:47
1:01:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:01:47
Josh Brown and Paul Grubbs join us to describe how those damned spam calls work, and how STIR/SHAKEN is supposed to try to stop them, but have other privacy and security implications as well. Transcript: https://securitycryptographywhatever.com/2024/04/30/stir-shaken/ Links: - https://iacr.org/submit/files/slides/2024/rwc/rwc2024/98/slides.pdf - ht…
…
continue reading
1
Why Companies Continue to Struggle with Supply Chain Security - Melinda Marks - ASW #283
1:19:42
1:19:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:19:42
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
…
continue reading
In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout of Apple IDs and the potential for a mobile wormable event. They explore the conditions necessary for a mobile wormable attack, including the development of zero-click exploits, the abuse of contact l…
…
continue reading
1
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
56:38
56:38
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
56:38
This week, we dive deep into the world of Kubernetes with John Dietz, co-founder of Kubefirst and a seasoned IT professional with over two decades of experience. John shares his extensive insights into the transformative power of Kubernetes and infrastructure as code (IaC) in modern cloud environments. Reflecting on his personal journey from skepti…
…
continue reading
1
Meet Silver SAML: Golden SAML in the Cloud - Eric Woodruff - BSW #348
59:35
59:35
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
59:35
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
…
continue reading
https://youtu.be/GnxViRW1A24This week on the podcast, we cover a nation-state backed attack against Cisco ASA appliances which Cisco TALOS themselves have dubbed "ArcaneDoor." After that, we discuss a phishing tookit being used to target LastPass users before ending with a new way to deliver malware payloads using legitimate services.…
…
continue reading
1
Ashley Burke's Resilience in the World of Fintech and Cyber Risk
47:00
47:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
47:00
When Ashley's journey led her from environmental studies to a pivotal role in cybersecurity, it wasn't just a career change – it was a reinvention. We're thrilled to share her candid story, illuminating how she balances the demands of family life with the rigors of fintech, where she excels in risk governance and vulnerability management. Ashley's …
…
continue reading
1
Episode 426 - Automatically exploiting CVEs with AI
37:31
37:31
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:31
Josh and Kurt talk about a paper describing using a LLM to automatically create exploits for CVEs. The idea is probably already happening in many spaces such as pen testing and intelligence services. We can't keep up with the number of vulnerabilities we have, there's no way we can possibly keep up with a glut of LLM generated vulnerabilities. We r…
…
continue reading
1
新コーナー「マークと仲間のここだけの話」 ‐キャリアの中で体験した〇〇な話‐vol.2
22:51
22:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
22:51
前回に引き続き、Verizonよりシニアマネージャー サイバーセキュリティコンサルティング石橋 豪さんをお迎えしお話を伺います。 サイトの構築や運用をやっていた石橋さんだからこそ話せる、 双方向視点からの“ここだけの話”。 「終わりのない仕事」ではなく「なくならない仕事」と お話されている姿が印象的でした。 メッセージメッセージフォームからご意見、ご質問ぜひお待ちしております。 https://form.audee.jp/websecurity/messageעל ידי ベライゾンジャパン
…
continue reading
1
Michael De Groot, "Disruption: The Global Economic Shocks of the 1970s and the End of the Cold War" (Cornell UP, 2024)
53:40
53:40
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:40
In Disruption: The Global Economic Shocks of the 1970s and the End of the Cold War (Cornell University Press, 2024), Dr. Michael De Groot argues that the global economic upheaval of the 1970s was decisive in ending the Cold War. Both the West and the Soviet bloc struggled with the slowdown of economic growth; chaos in the international monetary sys…
…
continue reading
Jon and Eric make it back from Texas, despite airport security. Nespresso has an open redirect vulnerability, eScan AV delivers updates via HTTP and Cisco has Zero-day fun time. Eric admires vaporizing water without heat while Jon is impressed with a pushing firmware updates to a spacecraft 15 billion miles away... 0:00 - Introduction 2:29 - Briske…
…
continue reading
GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisoriesעל ידי Carl Franklin
…
continue reading
1
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
38:18
38:18
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
38:18
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-381
…
continue reading
1
7MS #621: Eating the Security Dog Food - Part 6
23:37
23:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:37
Today we revisit a series about eating the security dog food – in other words, practicing what we preach as security gurus! Specifically we talk about: We’re going to get a third-party assessment on 7MinSec (the business) Tips for secure email backup/storage Limiting the retention of sensitive data you store in cloud places…
…
continue reading
There is a master key to your online identity. Listen now to learn what it is and one way you can safeguard it. Then come join us inside the IHP Academy! You can sign up for notifications of new podcast episodes by clicking here.על ידי IHP Academy
…
continue reading
1
Emerging national security threats
23:02
23:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:02
Felipe Fernandez, Chief Technology Officer at Fortinet Federal discusses the challenges and opportunities for enterprise security professionals in the scope of national security.
…
continue reading
1
Building cyber resilience: What to do when the unthinkable occurs
41:31
41:31
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
41:31
In this edition of the SecurityDNA podcast, SecurityInfoWatch sat down with Stevan Bernard, Senior Security Advisor for International SOS -- a firm that works with global organizations to assess the risks associated with every working environment, from a corporate office to a remote oil rig. Drawing on his extensive experience in the protection of …
…
continue reading
Eric performs Digital Spring Cleaning and Jon mostly works outside. Open source groups are worried about other 'XZ Style' hacks, Roku announces a second security incident, LastPass employee is deepfaked, and LG TV vulnerabilities. Don't expose your TVs to the internet folks. For fun we have an amazing article about deep sea cable repair ships and a…
…
continue reading
Overview John and Georgia are at the Linux Security Summit presenting on some longawaited developments in AppArmor and we give you all the details in a sneak peekpreview as well as some of the other talks to look out for, plus we coversecurity updates for NSS, Squid, Apache, libvirt and more and we put out a callfor testing of a pending AppArmor se…
…
continue reading
1
S14 E8 Throwing more technology at a problem doesn't solve it
49:21
49:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
49:21
#SecurityConfidential #DarkRhiinoSecurityThis week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Daryl Donley. Daryl is currently a VP at Outcomes responsible for Security and IT. He has a passion for building and solving problems through secure software and embraces secure software development practices. He sp…
…
continue reading
1
Unpacking Zscaler ThreatLabz’s 2024 State of AI Security Report
41:08
41:08
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
41:08
In this episode of the SecurityANGLE, host Shelly Kramer, managing director and principal analyst at theCUBE Research, is joined by Zscaler’s CSO, Deepen Desai, for a conversation about the findings in the company’s newly released 2024 AI Security Report. The survey relied on more than 18 billion transactions across the company’s cloud security pla…
…
continue reading
על ידי INNOQ
…
continue reading
1
Dustin Lehr -- Culture Change through Champions and Gamification
45:10
45:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
45:10
Dustin Lehr, Senior Director of Platform Security/Deputy CISO at Fivetran and Chief Solutions Officer at Katilyst Security, joins Robert and Chris to discuss security champions. Dustin explains the concept of security champions within the developer community, exploring the unique qualities and motivations behind developers becoming security advocat…
…
continue reading